Content Paint

Security

Europe's controversial cyber resilience law gets a rewrite -- now not as terrible as it was

A rewritten EU cyber resiliency act removes the biggest threats to open source but much standards work still to be done, says Linux Foundation Europe

Russian group hacks emails of Microsoft’s “senior leadership” and cybersecurity staff

"We will act immediately to apply our current security standards to Microsoft-owned legacy systems and internal business processes..."

vCenter Server vulnerability went exploited for two years unnoticed. Attacks are ongoing

There are no workarounds that remove the vulnerability, which allows unauthenticated remote command execution on vulnerable systems. A patch is available.

UK’s spy agencies grapple with IT modernisation–  as GCHQ ramps up hacking capabilities

MI5 is off to the cloud; GCHQ is ramping up Computer Network Exploitation capabilities; MI6 needs cultural changes to get a new IT platform running smoothly...

Porsche's "Formula E" team is speeding up performance by junking server racks

The 2023 season was “the first season we travelled with our whole IT equipment without any server rack..."

Opinion: It's time to level up the network for the hybrid workforce

"Enterprises are deploying a mix of technologies for secure remote access, including VPN, ZTNA, SD-WAN and SASE – on average respondents are using 2.3 different solutions, but..."

Ivanti VPN appliance exploitation now happening at scale

VPN appliances "all appear to have been constructed with the code equivalent of string, stamped with the word ‘secure’ and then just left to decay for 20 years..."

insider threat risks

"In every insider threat case, there is a combination of network activity and employee behaviour. The malicious activity crosses both physical and electronic modalities..."

Pre-auth RCE zero days in Ivanti VPNs are being exploited by a Chinese APT and there won’t be a patch for weeks. Buckle up.

Attackers re-write JavaScript loaded by the VPN login page for the Appliance to capture credentials; also grabbed Veeam credentials, moved laterally for full SYSTEM control.

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.